Questions tagged [file-access]

143 questions
6
votes
1 answer

If forced to download files using FTP, what steps can be taken to provide security?

I am in a situation where I must access data via FTP on a regular basis (for argument's sake, updated every 10 minutes). No other protocol is available for this operation. This data needs to be put onto a network share. I do not want to connect…
Stringers
  • 63
  • 1
  • 8
6
votes
4 answers

Are there a standard method(s) for me to give someone else read-only access to my data?

Are there a standard method(s) for me to give someone else read-only access to my data? There are several situations where I may want to give a few people read-only access to some data, but I would rather not give those people my secret passwords…
David Cary
  • 2,720
  • 4
  • 19
  • 20
6
votes
1 answer

What are concerns with storing passwords in a restricted public folder on exchange?

Is it safe to store data such as account log-in information (for vendor websites, not administrative accounts), settings policies, activation documentation, and operating system keys in a public folder on microsoft exchange and setting the…
Jeff
  • 509
  • 1
  • 4
  • 8
6
votes
1 answer

How to spare file server data from being held hostage by client ransomware?

Suppose in a network there is a file server which's storage is shared between all workstations and all users require full read/write access to this storage for their cooperation workflow. (Over samba, afd and nfs) If (at least) one client gets…
Tobi Nary
  • 14,302
  • 8
  • 43
  • 58
6
votes
3 answers

The history of thumbnails (or just a previous thumbnail) is embedded in an image file?

I was surprised when I cropped an image on Windows Phone, saved it, sent it via e-mail to a PC, and then downloaded it - and the thumbnail in the download folder was the one of original, not cropped image for a few seconds until finally it would…
Markus von Broady
  • 686
  • 1
  • 6
  • 14
6
votes
1 answer

How to grant permission to read a text file to a specific application run by a regular user?

A text file is situated in /opt/somefolder. It contains a pair login - password read by an application when authenticating on a server. The application is run by a regular user, so that the file can be also read by a regular user. The question is…
Evgeny
  • 185
  • 3
5
votes
2 answers

Is it possible to browse/access the files on a computer's hard drive by booting from an OS installed in a flash drive?

I have installed Tails in an USB flashdrive and then booted my macbook with it. I noticed that Tails was capable of seeing my macbook's hard drive. Out of curiosity I tried to browse it. Interestingly, I was capable to entering /Users/myName and…
Saturn
  • 563
  • 1
  • 5
  • 10
5
votes
1 answer

How to to make a file private by securing the url that only authenticated users can see

I was wondering if there is a way to secure an image or a file to be hidden when it is not authenticated. Suppose there is an image in my website which can only be seen if that user is authenticated. But the thing is I can copy the url or open the…
Robin
  • 153
  • 4
5
votes
3 answers

Can I use 777 file permissions inside server virtualisation (that only I have access to) without worry?

For this question, please assume I have followed every possible security measure to secure my Linux server. Only I have access to the web server via one open SSH port. If there are security issues then that's a separate issue. I'm using a cloud…
user2143356
  • 733
  • 1
  • 5
  • 7
5
votes
1 answer

Can a non-privileged user modify the file descriptor table of an elevated process?

In Linux, every process holds its own file descriptor table, which keeps references to all opened files and file-like devices. This table is managed by the kernel. Is it possible that a non-privileged user modifies a file descriptor in the file…
user163495
5
votes
3 answers

Could browsers improve security of stored passwords by using setuid?

On Unix-esque systems, Mozilla Firefox stores a users' preferences, web history and stored passwords in a set of files that are readible and writeable by that particular user. This makes sense: when the user bob is running Firefox, these files need…
5
votes
1 answer

Do AppArmor/SELinux provide any security for workstation?

I decided to harden security on my primary workstation a bit. Before I used to use firejail for certain less trusted apps (all apps with internet access) but it's kind of toy. Didn't work really well for me. So I tried to read about real tools which…
5
votes
2 answers

Can UNIX Domain Sockets be locked by user ID?

If I created a folder /tmp/me with permissions 700, and started a process under me that starts a listen socket under /tmp/me/socket. I currently assume that a connection to that socket originated from a process that is running on the very same…
700 Software
  • 13,807
  • 3
  • 52
  • 82
5
votes
3 answers

Is random URL token secure enough for file attachments and other user content?

Lets say we have a hypothetical system where there are various files are added by users and are sensitive, e.g. lets say an attachment to a private message. It's not that easy to verify access rights usually (in terms of implementation), since…
Ilya Chernomordik
  • 2,197
  • 1
  • 21
  • 36
4
votes
5 answers

How can I prevent someone from carrying out a file from a machine

Assume the following scenario: You have to set up a machine in a way that a user is unable to bring out a certain set of files (or a single file only) from that machine while he has to be able to access the file on the machine itself. The user has…
Wottensprels
  • 151
  • 3
1
2
3
9 10